Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp746863ybv; Fri, 7 Feb 2020 07:49:44 -0800 (PST) X-Google-Smtp-Source: APXvYqy6/PGLV0XDTjXQYqaxxfB15c/7ngG3yFbkiql7TBwvkfzNdjjG401gYuvmE8UWM8MCOkb9 X-Received: by 2002:a05:6808:7dd:: with SMTP id f29mr2567864oij.67.1581090584281; Fri, 07 Feb 2020 07:49:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581090584; cv=none; d=google.com; s=arc-20160816; b=v64/cFnLjfUwviItI48zTqQYgIZP0HnaoHqi9qtXzdo080d/nxR43yQHbAge/yPeQ2 gd7BD7hMqoqGSp2rE3kafGLw+RvK4xlY75AboZCevZT6KhO9unENLOCKxtWDlZcnWrHM z1VQeAqN3EGBxZdLM9oErVBWvhD3kliUZvPBuG7FVi4NlRF5t7RINr4mxwN3MqijsORC jQNd5Rx/IMulKlYcj8pkmfjr3yBwlV/nOaE+3RYhBWXXjV08aL/HG+941wYEiFyWrt0f xGb2l6zQQH6RNUfboeO7mb+Z2seZgSSBJEYDYnunwiPhbBd1mtxBOWDvfTx5+7f/vHWU UN5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:date:from:message-id; bh=NlGM49nK3qBN5wVUINqElxjQL8/nj2/411u1lToi91g=; b=dQadkAevV/6muiwF9gbd+6JW6U0dvIJhLQOOi+NkmLDZ830s9G+R8Cyj1oGPI9YdfX qJxcAz02ZR1qNfrZCPrJWawu9iaUF/SM8FZd1yvpY209+yy6aFM8Dm+Kc6LF3LAhpm02 uO0C9yFcic0qMxTHXzlqZdZh9vdGKue3l90Yz9xAadbdTMZe+uyZ2V0MZdHvCB18COLm TxOh4RGu40ZbSBNab4WZJocTDyzAVncV5OWMNmDLlWlapKXs7vO6MIFxOmDL6EHMGuTJ PmIqThC/U9BrK3rrrfhbUYVGCVkTKZqNPc19r8uw2CRlWaVy11BJf0a5EnoFKyenVIOt mHzw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m9si3916615oie.148.2020.02.07.07.49.31; Fri, 07 Feb 2020 07:49:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727068AbgBGPrU (ORCPT + 99 others); Fri, 7 Feb 2020 10:47:20 -0500 Received: from mailout3.hostsharing.net ([176.9.242.54]:41793 "EHLO mailout3.hostsharing.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727028AbgBGPrU (ORCPT ); Fri, 7 Feb 2020 10:47:20 -0500 Received: from h08.hostsharing.net (h08.hostsharing.net [83.223.95.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.hostsharing.net", Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified)) by mailout3.hostsharing.net (Postfix) with ESMTPS id 6682E100B01B2; Fri, 7 Feb 2020 16:47:17 +0100 (CET) Received: from localhost (unknown [87.130.102.138]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by h08.hostsharing.net (Postfix) with ESMTPSA id 097A8615E104; Fri, 7 Feb 2020 16:47:17 +0100 (CET) X-Mailbox-Line: From 988737dbbc4e499c2faaaa4e567ba3ed8deb9a89 Mon Sep 17 00:00:00 2001 Message-Id: <988737dbbc4e499c2faaaa4e567ba3ed8deb9a89.1581089797.git.lukas@wunner.de> From: Lukas Wunner Date: Fri, 7 Feb 2020 16:46:41 +0100 Subject: [PATCH] irqchip/bcm2835: Quiesce IRQs left enabled by bootloader To: Thomas Gleixner , Jason Cooper , Marc Zyngier , "Nicolas Saenz Julienne" Cc: Florian Fainelli , Ray Jui , Scott Branden , bcm-kernel-feedback-list@broadcom.com, linux-kernel@vger.kernel.org, linux-rpi-kernel@lists.infradead.org, linux-arm-kernel@lists.infradead.org, Serge Schneider , Kristina Brooks , Stefan Wahren , Matthias Brugger , Martin Sperl , Phil Elwell Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Customers of our "Revolution Pi" open source PLCs (which are based on the Raspberry Pi) have reported random lockups as well as jittery eMMC, UART and SPI latency. We were able to reproduce the lockups in our lab and hooked up a JTAG debugger: It turns out that the USB controller's interrupt is already enabled when the kernel boots. All interrupts are disabled when the chip comes out of power-on reset, according to the spec. So apparently the bootloader enables the interrupt but neglects to disable it before handing over control to the kernel. The bootloader is a closed source blob provided by the Raspberry Pi Foundation. Development of an alternative open source bootloader was begun by Kristina Brooks but it's not fully functional yet. Usage of the blob is thus without alternative for the time being. The Raspberry Pi Foundation's downstream kernel has a performance- optimized USB driver (which we use on our Revolution Pi products). The driver takes advantage of the FIQ fast interrupt. Because the regular USB interrupt was left enabled by the bootloader, both the FIQ and the normal interrupt is enabled once the USB driver probes. The spec has the following to say on simultaneously enabling the FIQ and the normal interrupt of a peripheral: "One interrupt source can be selected to be connected to the ARM FIQ input. An interrupt which is selected as FIQ should have its normal interrupt enable bit cleared. Otherwise a normal and an FIQ interrupt will be fired at the same time. Not a good idea!" ^^^^^^^^^^^^^^^ https://www.raspberrypi.org/app/uploads/2012/02/BCM2835-ARM-Peripherals.pdf page 110 On a multicore Raspberry Pi, the Foundation's kernel routes all normal interrupts to CPU 0 and the FIQ to CPU 1. Because both the FIQ and the normal interrupt is enabled, a USB interrupt causes CPU 0 to spin in bcm2836_chained_handle_irq() until the FIQ on CPU 1 has cleared it. Interrupts with a lower priority than USB are starved as long. That explains the jittery eMMC, UART and SPI latency: On one occasion I've seen CPU 0 blocked for no less than 2.9 msec. Basically, everything not USB takes a performance hit: Whereas eMMC throughput on a Compute Module 3 remains relatively constant at 23.5 MB/s with this commit, it irregularly dips to 23.0 MB/s without this commit. The lockups occur when CPU 0 receives a USB interrupt while holding a lock which CPU 1 is trying to acquire while the FIQ is temporarily disabled on CPU 1. I've tested old releases of the Foundation's bootloader as far back as 1.20160202-1 and they all leave the USB interrupt enabled. Still older releases fail to boot a contemporary kernel on a Compute Module 1 or 3, which are the only Raspberry Pi variants I have at my disposal for testing. Fix by disabling IRQs left enabled by the bootloader. Although the impact is most pronounced on the Foundation's downstream kernel, it seems prudent to apply the fix to the upstream kernel to guard against such mistakes in any present and future bootloader. An alternative, though more convoluted approach would be to clear the IRQD_IRQ_MASKED flag on all interrupts left enabled on boot. Then the first invocation of handle_level_irq() would mask and thereby quiesce those interrupts. Signed-off-by: Lukas Wunner Cc: Serge Schneider Cc: Kristina Brooks Cc: stable@vger.kernel.org --- drivers/irqchip/irq-bcm2835.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/drivers/irqchip/irq-bcm2835.c b/drivers/irqchip/irq-bcm2835.c index 418245d31921..0d9a5a7ebe2c 100644 --- a/drivers/irqchip/irq-bcm2835.c +++ b/drivers/irqchip/irq-bcm2835.c @@ -150,6 +150,13 @@ static int __init armctrl_of_init(struct device_node *node, intc.enable[b] = base + reg_enable[b]; intc.disable[b] = base + reg_disable[b]; + irq = readl(intc.enable[b]); + if (irq) { + writel(irq, intc.disable[b]); + pr_err(FW_BUG "Bootloader left irq enabled: " + "bank %d irq %*pbl\n", b, IRQS_PER_BANK, &irq); + } + for (i = 0; i < bank_irqs[b]; i++) { irq = irq_create_mapping(intc.domain, MAKE_HWIRQ(b, i)); BUG_ON(irq <= 0); -- 2.24.0